Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    06/07/2024, 07:02

General

  • Target

    27a6f94d0f00f7f590b4598d81aae3a4_JaffaCakes118.exe

  • Size

    432KB

  • MD5

    27a6f94d0f00f7f590b4598d81aae3a4

  • SHA1

    6cbc9ecfa4632a5fddff7fa2d9fd6e07f894954b

  • SHA256

    221ecd2487198c29b649fe52d9b4750726ca313618fb54fb54d47a34b4ee3564

  • SHA512

    a88b3f44c7fe1147d68815580252b092ca9d9f45ad69f0122217cafdb631552097f1c80490fb3583b22c28e5bc8ec4138fa05693c09b81593a90bffc56eba2ae

  • SSDEEP

    1536:Suy1OHiO3R1NyCRSzBw2NqVnGLo9TLfFEhC50G9JsP96+T+kmmOON5jU1YYCsMDn:SuyCR2QVGLo9ffFEOsDpjnB9be6

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\27a6f94d0f00f7f590b4598d81aae3a4_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\27a6f94d0f00f7f590b4598d81aae3a4_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2368
    • C:\Users\Admin\AppData\Local\Temp\27a6f94d0f00f7f590b4598d81aae3a4_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\27a6f94d0f00f7f590b4598d81aae3a4_JaffaCakes118.exe
      2⤵
      • Adds Run key to start application
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies system certificate store
      • Suspicious use of SetWindowsHookEx
      PID:2280

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    397e7c5f7b6246adcf4eb482017c7bb6

    SHA1

    3fd7a8d6fc413b2a0442702aceaa75eacfb7cbb5

    SHA256

    f94c52b25e262eaef04109bad6d0ad1cf412b78eda4210d41b858e441e660c67

    SHA512

    b5c84aa8cc95b533bd1b875dad18745d6b0e7a6ab7336f882b1601e57e8f83a1da6940bb966d01c4e3d561a4031f9edca0c51a003b71d64ad4df3dd263ca44dd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5fa0f55e6a255e151bdcc931363cc723

    SHA1

    fc81349a689e5ce392137b672598fb0e5310bff0

    SHA256

    20a4450d2e0762fc05cf94a4625f23ad88f61f35f6cfb9b54e2fbb64d24e6336

    SHA512

    724fb02a2d4b8135b7a38fbd4400d08b88b9cbd5c465904a3de2b1da1c8c780f824c353b519bc3598aab5fcd1a2da2097a40c31cc0b917f67b3f8fce832b7c6a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e5bc4997f44dfa05792c97cfd3ec7faf

    SHA1

    51f42cc12a6a6adf1418a7fd8c8185cfa5befa98

    SHA256

    f671fce4298f1b6bd9bd6a6c4518098ddd1b394b5dcf23bbdafca1afb4212677

    SHA512

    625be7f35150e61d160d7bdeac2b8c741c3933fd48cc8c73b0a63fe347b43fd119f8210b8eea1ba4bfc7c8ff31603f8742dcaa9515190faff7a93e282059e3ee

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    243d9dd69aa77bd04155faaedadffbba

    SHA1

    5bec4d1b4a1f8bf739c3f6f8c481a69eab49b61e

    SHA256

    cc7430c48c06404220f6810357cd5cefbf70a3358cf55b14ff609724e864f838

    SHA512

    022d3ddb0b344f04a942d20dfacf940e66e90f386acd8ad66162b588ef7c8abc1c29ce5f1a7281b837e1595c4bc925e41219efbda9b9b61db2fe32b9550379d6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    eca88d39aa9da1f0a349fa1456cd0a85

    SHA1

    6cafa142cb1909315ece97337c0617f86016b6f3

    SHA256

    0e62d4888f9c2e334247225aba4829fc481196a4add2496c3f1f23ab563b1a39

    SHA512

    45a07f635cb045773e98225fee618a84e62418316e501347ecddaf321554686cad42901393189183ce15eb72eac4247e7a88a5970db3b680864d9be5e674af24

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    16d8de4fbec7744962af6348870f0e83

    SHA1

    8efbac4aec0cdeb1b0d9a95fcb057e28a73c512d

    SHA256

    eadae52ec1f615248e8df91d52292a7e85c47a32769afe235a3a3694d4681fce

    SHA512

    d5f82a217c6a019b45fc242bab028f4f0a698510dc2af4ca9fbb6ce248acafbd414c0d93d574a998b35f50ec35017985e8f1d10f028ea680f3872dd8a48bf8a9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8155f6e6c1b8d87e6eb7f2a1a9fce56f

    SHA1

    ef2ccfaaacf916fbeb2f0facc389c41d834f8ba6

    SHA256

    e774313c84361b9f9c783899bd41ee42469d48518a05bf927c1a00dd768f90fa

    SHA512

    b9e6d2478aef5fafef746748b1a783316eda511b7f917d0a20478c5b78f1b5cc76e5bf5e005d8003845e973808d4261d269a3eb48c5ab360ea4356f869098d00

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8f463de318579b5f8f52571defc04229

    SHA1

    b3eaca32da3515ebd15a3abb07bd1243252b1d0c

    SHA256

    0194ac552eb8dbdae35fa6a3b572688018ce6c753a548a914c7c368e23cccda1

    SHA512

    bd6f93dad5dafed6ab4dc7f359e3239c2d3ede56f0ecd94a32a8e7b0fa8fee00add54031c977425ed591deb171367030c365e88bd470582bc5095411798c8669

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ed10f436616cfe7b74557cacfab06b46

    SHA1

    a9212ebf5d97fd97be7a594a893bcde6e295edba

    SHA256

    94a96ddf54f4d53962992f767a35460256070d92c576840039a4744816e22fdb

    SHA512

    b2cc5d83d83e3b2aab36aa878d13be3d506e44a68ad70dc6910169c9a7648b3864e86b968df0ae8143cf43f72b385de1387ed5e727e5be003b819641a2c98b18

  • C:\Users\Admin\AppData\Local\Temp\Cab449F.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar4511.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2280-2-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/2280-297-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/2280-8-0x00000000045F0000-0x0000000005652000-memory.dmp

    Filesize

    16.4MB

  • memory/2280-7-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/2280-4-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB